First published: Wed Apr 01 2015(Updated: )
The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =20 | |
Fedora | =21 | |
Xen XAPI | =4.3.0 | |
Xen XAPI | =4.3.1 | |
Xen XAPI | =4.3.2 | |
Xen XAPI | =4.4.0 | |
Xen XAPI | =4.4.1 | |
Xen XAPI | =4.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2752 is classified as a medium severity vulnerability, as it can lead to denial of service through excessive CPU consumption.
To fix CVE-2015-2752, update to a patched version of Xen or Fedora that addresses the vulnerability.
CVE-2015-2752 affects Xen versions from 3.2.x through 4.5.x specifically when using PCI passthrough devices.
CVE-2015-2752 can be exploited by local x86 HVM domain users sending crafted requests to the device model.
Yes, CVE-2015-2752 can impact the host system by causing increased CPU consumption leading to a denial of service.